[Phpmyadmin-devel] [Fwd: Re: CVE for phpMyAdmin PMASA-2007-6]

Marc Delisle Marc.Delisle at cegepsherbrooke.qc.ca
Tue Oct 23 14:06:46 CEST 2007


Hi Thijs,
yes it's a good idea, I'll implement your suggestions.

Marc

Thijs Kinkhorst a écrit :
> Hi devs,
> 
> I requested a CVE id to be assigned for PMASA-2007-6, which is quoted below.
> If I have spotted it correctly, I see not much use of CVE id's within
> phpMyAdmin. It would be very helpful for security workers in e.g.
> distributions if the PMASA advisories would mention the corresponding CVE
> numbers when such a number is or becomes available. It could also have a
> place in the relevant changelog entry that fixes the problem.
> 
> Would you consider doing that?
> 
> Thanks
> Thijs
> (also on behalf of the Debian security team)
> 
> 
> ---------------------------- Original Message ----------------------------
> Subject: Re: CVE for phpMyAdmin PMASA-2007-6
> From:    "Steven M. Christey" <coley at linus.mitre.org>
> Date:    Mon, October 22, 2007 22:19
> To:      "Thijs Kinkhorst" <thijs at debian.org>
> Cc:      cve at mitre.org
> --------------------------------------------------------------------------
> 
> 
> Hello,
> 
> Use CVE-2007-5589
> 
> - Steve
> 
> ======================================================
> Name: CVE-2007-5589
> Status: Candidate
> URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5589
> Reference:
> MISC:http://www.digitrustgroup.com/advisories/TDG-advisory071015a.html
> Reference:
> CONFIRM:http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_1/phpMyAdmin/ChangeLog?r1=10796&r2=10795&pathrev=10796
> Reference:
> CONFIRM:http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=10796
> Reference:
> CONFIRM:http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2007-6
> Reference: FRSIRT:ADV-2007-3535
> Reference: URL:http://www.frsirt.com/english/advisories/2007/3535
> Reference: SECUNIA:27246
> Reference: URL:http://secunia.com/advisories/27246
> 
> Muliple cross-site scripting (XSS) vulnerabilities in phpMyAdmin
> before 2.11.1.2 allow remote attackers to inject arbitrary web script
> or HTML via certain input available in (1) PHP_SELF in (a)
> server_status.php, and (b) grab_globals.lib.php, (c)
> display_change_password.lib.php, and (d) common.lib.php in libraries/;
> and certain input available in PHP_SELF and (2) PATH_INFO in
> libraries/common.inc.php.  NOTE: there might also be other vectors
> related to (3) REQUEST_URI.
> 
> 
> 
> 
> 
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> Phpmyadmin-devel mailing list
> Phpmyadmin-devel at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/phpmyadmin-devel
> 





More information about the Developers mailing list